Articles

Access the latest knowledge in applied science, electrical engineering, computer science and information technology, education, and health.

Filter Icon

Filters article

Years

FAQ Arrow
0
0

Source Title

FAQ Arrow

Authors

FAQ Arrow

29,734 Article Results

Classification of Leaf Disease from Image Processing Technique

10.11591/ijeecs.v10.i1.pp191-200
Mahanijah Md Kamal , Ahmad Nor Ikhwan Masazhar , Farah Abdul Rahman
Disease in palm oil sector is one of the major concerns because it affects the production and economy losses to Malaysia. Diseases appear as spots on the leaf and if not treated on time, cause the growth of the palm oil tree. This work presents the use of digital image processing technique for classification oil palm leaf disease sympthoms. Chimaera and Anthracnose is the most common symtoms infected the oil palm leaf in nursery stage. Here, support vector machine (SVM) acts as a classifier where there are four stages involved. The stages are image acquisition, image enhancement, clustering and classification. The classification shows that SVM achieves accuracy of 97% for Chimaera and 95% for Anthracnose.
Volume: 10
Issue: 1
Page: 191-200
Publish at: 2018-04-01

Cluttered Traffic Distribution in LoRa LPWAN

10.11591/ijeecs.v10.i1.pp214-223
Nur Aishah Bt. Zainal , Mohamed Hadi Habaebi , Israth Chowdhury , Md Rafiqul Islam
Low Power WAN (LPWAN) is a wireless broad area network technology. It is interconnects using only low bandwidth, less power consumption at long range. This technology is operating in unauthorized spectrum which designed for wireless data communication. To have an insight of such long-range technology, this paper evaluates the performance of LoRa radio links under shadowing effect and realistic smart city utilities clutter grid distribution. Such environment is synonymous to residential, industrial and modern urban centers. The focus is to include the effect of shadowing on the radio links while attempting to study the optimum sink node numbers and their locations for maximum sensor node connectivity. Results indicate that the usual unrealistic random node distribution does not reflect actual real-life scenario where many of these sensing nodes follow the built infrastructure around the city of smart buildings. The system is evaluated in terms of connectivity and packet loss ratio.
Volume: 10
Issue: 1
Page: 214-223
Publish at: 2018-04-01

Grid & Force Based Sensor Deployment Methods in WSN using PSO

10.11591/ijeecs.v10.i1.pp271-279
Aparna Pradeep Laturkar , Sridharan Bhavani , DeepaliParag Adhyapak
Wireless Sensor Network (WSN) is emergingtechnology and has wide range of applications, such as environment monitoring, industrial automation and numerous military applications. Hence, WSN is popular among researchers. WSN has several constraints such as restricted sensing range, communication range and limited battery capacity. These limitations bring issues such as coverage, connectivity, network lifetime and scheduling & data aggregation. There are mainly three strategies for solving coverage problems namely; force, grid and computational geometry based. PSO is a multidimensional optimization method inspired from the social behavior of birds called flocking. Basic version of PSO has the drawback of sometimes getting trapped in local optima as particles learn from each other and past solutions. This issue is solved by discrete version of PSO known as Modified Discrete Binary PSO (MDBPSO) as it uses probabilistic approach. This paper discusses performance analysis of random; grid based MDBPSO (Modified Discrete Binary Particle Swarm Optimization), Force Based VFCPSO and Combination of Grid & Force Based sensor deployment algorithms based on interval and packet size. From the results of Combination of Grid & Force Based sensor deployment algorithm, it can be concluded that its performance is best for all parameters as compared to rest of the three methods when interval and packet size is varied.
Volume: 10
Issue: 1
Page: 271-279
Publish at: 2018-04-01

An Optimum Approach for Preprocessing of Web User Query

10.11591/ijict.v7i1.pp8-12
Sunny Sharma , Sunita Sunita , Arjun Kumar , Vijay Rana
The emergence of the Web technology generated a massive amount of raw data by enabling Internet users to post their opinions, comments, and reviews on the web. To extract useful information from this raw data can be a very challenging task. Search engines play a critical role in these circumstances. User queries are becoming main issues for the search engines. Therefore a preprocessing operation is essential. In this paper, we present a framework for natural language preprocessing for efficient data retrieval and some of the required processing for effective retrieval such as elongated word handling, stop word removal, stemming, etc. This manuscript starts by building a manually annotated dataset and then takes the reader through the detailed steps of process. Experiments are conducted for special stages of this process to examine the accuracy of the system.
Volume: 7
Issue: 1
Page: 8-12
Publish at: 2018-04-01

Multi-objective IT Project Selection Model for Improving SME Strategy Deployment

10.11591/ijece.v8i2.pp1102-1111
Abir El Yamami , Khalifa Mansouri , Mohammed Qbadou , El Hossein Illousamen
Due to the limited financial resources of small and Medium-sized enterprises (SMEs), the proven approaches for selecting IT project portfolio for large enterprises may fail to perform in SMEs; SME top management want to make sure that the corporate strategy is carried out effectively by IT project portfolio before investing in such projects. In order to provide automated support to the selection of IT projects, it seems inevitable that a multi-objective approach is required in order to balance possible competing and conflicting objectives. Under such an approach, individual projects would be evaluated not just on their own performance but on the basis of their contribution to balance the overall portfolio. In this paper, we extend and explore the concept of IT project selection to improve SME strategy deployment. In particular, we present a model that assesses an individual project in terms of its contribution to the overall strategic objectives of the portfolio. A simulation using the model illustrates how SME can rapidly achieve maximal business goals by deploying the multi-objective algorithm when selecting IT projects.
Volume: 8
Issue: 2
Page: 1102-1111
Publish at: 2018-04-01

Swarm Based Cross Layer Optimization Protocol for WMSN

10.11591/ijeecs.v10.i1.pp302-308
DeepaliParag Adhyapak , Sridharan Bhavani , Aparna Pradeep Laturkar
Wireless Multimedia Sensor Network (WMSN) is comprised of tiny, low cost multimedia devices such as video cameras and microphones. These networks can transfer scalar as well as multimedia data into real time as well as non-real time applications. However addition of such devices exposes additional challenges on both QoS assurance and energy efficiency for efficient use of resources.  This paper presents cross layer based AntSenseNet protocol to meet various QoS requirements such as throughput, jitter, lifetime and packet delivery ratio in order to improve network lifetime. Cross layer routing protocol utilizes scheduling algorithm and AntSenseNet protocol builds hierarchical structure and able to use multipath routing protocol.  Simulation results shows Cross layer based AntSenseNet protocol outperforms Ant Sense routing protocol and cross layer routing protocol in terms of throughput and packet delivery ratio
Volume: 10
Issue: 1
Page: 302-308
Publish at: 2018-04-01

The End User Requirement for Project Management Software Accuracy

10.11591/ijece.v8i2.pp1112-1121
Fachrurrazi Fachrurrazi
This research explains the relationship between the end user requirement and accuracy of PMS (Project Management Software). The research aims are to analyze the PMS accuracy and measuring the probability of PMS accuracy in achieving ±1% of the end user requirement. The bias statistical method will be used to prove the PMS accuracy that based on the hypothesis testing. The result indicates the PMS is still accurate to be implemented in Aceh-Indonesia area projects that using the SNI (National Indonesia Standard as current method) with the accuracy index of ±7.5%. The achievement probability of reaching the end user requirement is still low of ±21.77%. In case of the PMS, the low achievement of the end user requirement is not only caused by the low accuracy of the PMS but also caused by the amount of variability error, which is influenced by the amount of variation of the project activity. In this study, we confirm that it is necessary to reconcile both conditions between the PMS accuracy and the end user requirements.
Volume: 8
Issue: 2
Page: 1112-1121
Publish at: 2018-04-01

A Survey on Graph Database Management Techniques for Huge Unstructured Data

10.11591/ijece.v8i2.pp1140-1149
Patil N. S. , Kiran P , Kiran N. P. , Naresh Patel K. M.
Data analysis, data management, and big data play a major role in both social and business perspective, in the last decade. Nowadays, the graph database is the hottest and trending research topic. A graph database is preferred to deal with the dynamic and complex relationships in connected data and offer better results. Every data element is represented as a node. For example, in social media site, a person is represented as a node, and its properties name, age, likes, and dislikes, etc and the nodes are connected with the relationships via edges. Use of graph database is expected to be beneficial in business, and social networking sites that generate huge unstructured data as that Big Data requires proper and efficient computational techniques to handle with. This paper reviews the existing graph data computational techniques and the research work, to offer the future research line up in graph database management.
Volume: 8
Issue: 2
Page: 1140-1149
Publish at: 2018-04-01

A Status Data Transmitting System for Vessel Monitoring

10.11591/ijece.v8i2.pp917-925
The Anh Nguyen Dinh , Huy Le Xuan , Tuan Anh Vu , Duong Bach Gia
This paper presents a status data transmitting system suitable for vessel monitoring. The system consists of four main parts, which are a status data module, a frequency synthesizer, a power amplifier and a horn antenna. The status data module packs information of the identification, longitude, latitude and state of the vessel into data frames. FSK/MSK/GMSK schemes were used to modulate the data. The frequency synthesizer was designed with very high stability over temperature and very low frequency tolerance. The power amplifier provides 130 W output power at S band. The impedance bandwidth of the horn antenna can be controlled using the beveling technique.
Volume: 8
Issue: 2
Page: 917-925
Publish at: 2018-04-01

Design and Implementation Multimedia Learning Success for Vocational Schools

10.11591/ijece.v8i2.pp1067-1073
Fitro Nur Hakim , Achmad Solechan
This research aims to design a web-based multimedia applications, interactive learning, in order to improve the learning outcomes of students, especially students of Vocational High School. Multimedia Learning has been designed with some additional content in the form of applications: decision support system for multimedia usage based on Model of Multimedia Learning Success. The population obtained from respondents vocational school in Central Java, which is already implementing multimedia learning. The method used is qualitative analysis in the form of: the development of multimedia learning integrated with decision support systems. Design and implementation of multimedia learning success system that is abbreviated "Sikemuning". Sikemuning can be used to measure or provide guidance for teachers in the use of multimedia. Interviews with several respondents teachers from vocational schools in Central Java showed that: the system success multimedia learning developed in this study can be used as feedback to assess the success and effectiveness of the implementation of learning activities, multimedia learning can improve the performance and intelligence of vocational school students.
Volume: 8
Issue: 2
Page: 1067-1073
Publish at: 2018-04-01

Efficient Encryption Technique for H.264/AVC Videos Based on CABAC and Logistic Map

10.11591/ijict.v7i1.pp39-48
Fatma K Tabash , M. Izharuddin
Nowadays, the demands of real-time video communication are increased rapidly. Search and rescue(SAR) applications like earthquake rescue, avalanche victims, wildfire monitoring in addition to highway surveillance are considered examples of real-time applications. In which, communication time is considered the most important metric to be optimized to ensure support for victims’ lives. Thus finding a simple and time efficient encryption technique for securing the transmitted data become mandatory. In this paper, we present an efficient encryption technique which has low computation complexity, low processing time and highly chaotic encrypted videos. The proposed technique is based on CABAC where the bin-string of Intra-Prediction Mode is encrypted with chaotic signals and the sign of MVD is toggled randomly. For residue coefficients the sign of the AC coefficients are flipped randomly and the first value of DC coefficients is encrypted by XORing the bin-string with random stream. All random streams are generated with chaotic systems using Logistic map. The experimental results shows that the proposed technique is highly effective for real-time application and robust against different types of attacks.
Volume: 7
Issue: 1
Page: 39-48
Publish at: 2018-04-01

Kalman Filter Algorithm for Mitigation of Power System Harmonics

10.11591/ijece.v8i2.pp771-779
K. Dhineshkumar , C. Subramani
The maiden application of a variant of Kalman Filter (KF) algorithms known as Local Ensemble Transform Kalman Filter (LET-KF) are used for mitigation and estimation power system harmonics are proposed in this paper. The proposed algorithm is applied for estimating the harmonic parameters of power signal containing harmonics, sub-harmonics and inter-harmonics in presence of random noise. The KF group of algorithms are tested and applied for both stationary as well as dynamic signal containing harmonics. The proposed LET-KF algorithm is compared with conventional KF based algorithms like KF, Ensemble Kalman Filter (En-KF) algorithms for harmonic estimation with the random noise values 0.001, 0.05 and 0.1. Among these three noises, 0.01 random noise results will give better than other two noises. Because the phase deviation and amplitude deviation less in 0.01 random noise. The proposed algorithm gives the better results to improve the efficiency and accuracy in terms of simplicity and computational features. Hence there are less multiplicative operations, which reduce the rounding errors. It is also less expensive as it reduces the requirement of storing large matrices, such as the Kalman gain matrix used in other KF based methods.
Volume: 8
Issue: 2
Page: 771-779
Publish at: 2018-04-01

Notice of Retraction Digital Image Steganography Using Bit Flipping

10.11591/ijict.v7i1.pp1-7
Aditya Kumar Sahu , Gandharba Swain
Notice of Retraction-----------------------------------------------------------------------After careful and considered review of the content of this paper by a duly constituted expert committee, this paper has been found to be in violation of IAES's Publication Principles.We hereby retract the content of this paper. Reasonable effort should be made to remove all past references to this paper.The presenting author of this paper has the option to appeal this decision by contacting info@iaesjournal.com.-----------------------------------------------------------------------This article proposes bit flipping method to conceal secret data in the original image. Here a section consists of 2 pixels and there by flipping one or two LSBs of the pixels to hide secret information in it. It exists in 2 variants. The variant-1 and variant-2 both use 7th and 8th bit to conceal the secret data. Variant-1 hides 3 bits per a pair of pixels and the variant-2 hides 4 bits per a pair of pixels. Our proposed method notably raises the capacity as well as bits per pixel that can be hidden in the image compared to existing bit flipping method. The image steganographic parameters such as, peak signal to noise ratio (PSNR), hiding capacity, and the quality index of the proposed techniques has been compared with the existing bit flipping technique
Volume: 7
Issue: 1
Page: 1-7
Publish at: 2018-04-01

Performance Enhancement in Active Power Filter (APF) by FPGA Implementation

10.11591/ijece.v8i2.pp689-698
Shamala N , C. Lakshminarayana
The generated electrical power in present days is not able to meet its end-user requirement as power demand is gradually increasing and expected to be increasing more in future days. In the power quality management, the parameters/factors like harmonic currents (HC) and reactive power (RP) yields the major issues in the power distribution units causing transformer heating, line losses, and machine vibration. To overcome these issues, several control mechanisms have been presented and implemented in recent past. The control algorithm based on synchronous reference frame (SRF) offers a better response by dividing the HC and RP. But the SRF based control algorithm requires better synchronization among the utility voltage and input current. To achieve this, the existing researches have used digital signal processing (DSP) and microcontroller, but these systems fail to provide better performance as they face issues like limited sampling time, less accuracy, and high computational complexity. Thus, to enhance the performance of active power filter (APF), we present an FPGA based approach. Also, to validate the performance of the proposed approach, we have used Xilinx 14.7 and Modelsim (6.3f) simulator and compared with other previous work. From the results analysis, it is found that the approach has good performance.
Volume: 8
Issue: 2
Page: 689-698
Publish at: 2018-04-01

Analysis of Inductance Gradient and Current Density Distribution Over Different Cross-section of Rails

10.11591/ijece.v8i2.pp723-729
M. N. Saravana Kumar , R. Murugan
In a rail gun system the armature accelerated due to the Lorentz force caused by the current which is diffused in to the rails. The entire system depends on the inductance gradient of the rail which is directly connected to the accelerating performance and efficiency of railgun. Hence, the exact analysis of inductance gradient is extremely significant for the railgun design. Since short duration of current pulse is applied to the rails determination of inductance gradient is very difficult. The inductance gradient varies with the geometric dimensions of the rails and armature. And it can be calculated with analytical method and numerical methods. In this paper inductance gradient of the rail has been computed and compared with the different rail cross-sectional models using Ansoft Maxwell Eddy current solver uses finite element technique to calculate the field distribution in a space. The current density, magnetic flux density, repulsive force acting on the rails also computed to analyze the performance of rail gun.
Volume: 8
Issue: 2
Page: 723-729
Publish at: 2018-04-01
Show 1456 of 1983

Discover Our Library

Embark on a journey through our expansive collection of articles and let curiosity lead your path to innovation.

Explore Now
Library 3D Ilustration